Chapter 4. Enterprise 802.11 Layer 2 Authentication Methods

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • WLAN authentication overview

  • AAA

    • Authentication

    • Authorization

    • Accounting

  • 802.1X

    • Supplicant

    • Authenticator

    • Authentication server

  • Supplicant credentials

    • Usernames and passwords

    • Digital certificates and PACs

    • One-time passwords

    • Smart cards and USB tokens

    • Machine authentication

    • Preshared keys

    • Proximity badges and RFID tags

    • Biometrics

  • Authentication server credentials

  • Shared secret

  • Legacy authentication protocols

    • PAP

    • CHAP

    • MSCHAP

    • MSCHAPv2

  • EAP

    • Weak EAP protocols

    • EAP-MD5

    • EAP-LEAP

    • Strong EAP protocols

    • EAP-PEAP

    • EAP-TTLS

    • EAP-TLS

    • EAP-FAST

    • Miscellaneous EAP protocols

    • EAP-SIM

    • EAP-AKA

Enterprise 802.11 Layer 2 Authentication Methods

WLAN ...

Get CWSP® Certified Wireless Security Professional Official: Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.